(NEW) Passleader Free Microsoft 70-980 New Premium PDF Questions

QUESTION 1Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.All client computers run either Windows 7 or Windows 8.Goal: You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.Solution: You implement the 802.1x Network Access Protection (NAP) enforcement method.Does this meet the goal?

A. YesB. No

Answer: A

QUESTION 2Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security updates installed. You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.Solution: You implement the VPN enforcement method.Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 3Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security updates installed. You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.Does this meet the goal?

A. YesB. No

Answer: A

QUESTION 4Drag and Drop QuestionYour network contains an Active Directory domain named contoso.com. The domain contains five servers. The servers are configured as shown in the following table.You plan to implement Network Access Protection (NAP) with IPSec enforcement on all client computers. You need to identify on which servers you must perform the configurations for the NAP deployment. Which servers should you identify? To answer, drag the appropriate servers to the correct actions. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 5Drag and Drop QuestionYour network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 resides in the perimeter network and has the Remote Access server role installed. Some users have laptop computers that run Windows 7 and are joined to the domain. Some users work from home by using their home computers. The home computers run either Windows XP, Windows Vista/ Windows 7, or Windows 8. You need to configure the computers for remote access. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

QUESTION 6Your network contains an Active Directory domain. All servers run Windows Server 2012 R2. The domain contains the servers shown in the following table.You need to recommend which servers will benefit most from implementing data deduplication. Which servers should you recommend?

A. Server1 and Server2B. Server1 and Server3C. Server1 and Server4D. Server2 and Server3E. Server2 and Server4F. Server3 and Server4

Answer: D

QUESTION 7Your network contains an Active Directory forest named adatum.com. All domain controllers run Windows Server 2008 R2. The functional level of the domain and the forest is Windows Server 2008. You deploy a new Active Directory forest named contoso.com. All domain controllers run Windows Server 2012 R2. The functional level of the domain and the forest is Windows Server 2012 R2. You establish a two-way, forest trust between the forests. Both networks contain member servers that run either Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 or Windows Server 2008. You plan to use the Active Directory Migration Tool 3.2 (ADMT 3.2) to migrate user accounts from adatum.com to contoso.com. SID history will be used in contoso.com and passwords will be migrated by using a Password Export Server (PES). You need to recommend which changes must be implemented to support the planned migration. Which two changes should you recommend? Each correct answer presents part of the solution.

A. In the contoso.com forest, deploy a domain controller that runs Windows Server 2008 R2.B. In the adatum.com forest, upgrade the functional level of the forest and the domain.C. In the contoso.com forest, downgrade the functional level of the forest and the domain.D. In the adatum.com forest, deploy a domain controller that runs Windows Server 2012 R2.

QUESTION 8Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. You plan to implement Windows Server 2012 R2. You need to create a report that includes the following information:The servers that run applications and services that can be moved to Windows Server 2012 R2 The servers that have hardware that can run Windows Server 2012 R2 The servers that are suitable to be converted to virtual machines hosted on Hyper-V hosts that run Windows Server 2012 R2Solution: You install Windows Server 2012 R2 on a new server, and then you run Microsoft Deployment Toolkit (MDT) 2012.Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 9Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. You plan to implement Windows Server 2012 R2. You need to create a report that includes the following information:The servers that run applications and services that can be moved to Windows Server 2012 R2 The servers that have hardware that can run Windows Server 2012 R2 The servers that are suitable to be converted to virtual machines hosted on Hyper-V hosts that run Windows Server 2012 R2Solution: You install Windows Server 2012 R2 on a new server, and then you run the Windows Server Migration Tools. Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 10Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirementSolution: You set the ISATAP State to state disabled.Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 11Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate network. You need to recommend a solution for the planned DirectAccess deployment that meets the security policy requirement.Solution: You enable split tunneling.Does this meet the goal?

A. YesB. No

Answer: B

QUESTION 12Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server server role installed. You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 802.lx enforcement method. You add a new switch to the network and you configure the switch to use 802.lx authentication. You need to ensure that only compliant client computers can access network resources through the new switch. What should you do on Server1?

A. Add the IP address of each new switch to a remediation server group.B. Add the IP address of each new switch to the list of RADIUS clients.C. Add the IP address of each new switch to a connection request policy as an Access Client IPv4 Address.D. Add the IP address of each new switch to a remote RADIUS server group.

Answer: B

QUESTION 13Your network contains an Active Directory domain named contoso.com. Your company has 100 users in the sales department. Each sales user has a domain-joined laptop computer that runs either Windows 7 or Windows 8. The sales users rarely travel to the company’s offices to connect directly to the corporate network. You need to recommend a solution to ensure that you can manage the sales users’ laptop computers when the users are working remotely. What solution should you include in the recommendation?

A. Deploy the Remote Access server role on a server on the internal network.B. Deploy the Network Policy and Access Services server role on a server on the internal network.C. Deploy a Microsoft System Center 2012 Service Manager infrastructure.D. Deploy a Microsoft System Center 2012 Operations Manager infrastructure.

Answer: A

QUESTION 14Hotspot QuestionYour network contains an Active Directory domain named contoso.com. The domain has a certification authority (CA). You create four certificate templates. The templates are configured as shown in the following table:You install the Remote Access server role in the domain. You need to configure DirectAccess to use one-time password (OTP) authentication. What should you do? To answer, select the appropriate options in the answer area.

Answer:

QUESTION 15Drag and Drop QuestionYour company plans to deploy a remote access solution to meet the following requirements:– Ensure that client computers that are connected to the Internet can be managed remotely without requiring that the user log on.– Ensure that client computers that run Windows Vista or earlier can connect remotely. – Ensure that non-domain-joined computers can connect remotely by using TCP port 443. You need to identify which remote access solutions meet the requirements. Which solutions should you identify? To answer, drag the appropriate solution to the correct requirement in the answer area. Each solution may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.